IMPLEMENTASI KRIPTANALIS BERBASIS NEURAL NETWORK FEEDFORWARD BACKPROPAGATION MULTI LAPIS TERHADAP KRIPTOGRAFI S-DES

  • Fritz Gamaliel Politeknik META Industri Cikarang
  • P. Yudi Dwi Arliyanto Politeknik META Industri Cikarang

Abstract

Cryptography is used to ensure the confidential information between the sender and the recipient. The sender encrypts the confidential information before it is transmitted to the recipient. After the encrypted confidential information is received by the recipient, the recipient then performs decryption on the encrypted confidential information. In practice, there are third parties who attempt to use various methods to find out the contents of the confidential information. In this study, the researchers perform cryptanalysis on the cryptographic system. The researchers use the S-DES cryptographic method and the neural network multilayer backpropagation cryptanalysis method. Both the training and testing processes use all possible combinations of plaintexts, keys, and ciphertexts in the S-DES cryptographic system. The accuracy of the trained model is evaluated by calculating the match percentage between ciphertext that produced by the model and ciphertext that produced by S-DES. The results show the neural network–based cryptanalysis that used in this research is not sufficiently accurate in performing cryptanalysis on the S-DES cryptographic system. This can be seen from the accuracy test results, which are below 1%.

References

[1] K. M. Alallayah, W. F. A. El-Wahed, M. Amin, and A. H. Alhamami, “Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks,” J. Comput. Sci., vol. 6, no. 1, pp. 29–35, 2010.
[2] M. W. Kurniaga, A. Yulianto, and T. Setya Aji Kumoro, “Kriptanalisis DES menggunakan Jaringan Syaraf Tiruan,” Fidel. J. Tek. Elektro, vol. 4, no. 2, pp. 40–44, 2022, doi: 10.52005/fidelity.v4i2.89.
[3] F. Paradise and S. Indarjani, “Pemulihan Kunci pada Simplified Data Encryption Standard (S-DES) Melalui Serangan Aljabar: Studi Kasus,” Info Kripto, vol. 19, no. 1, pp. 13–27, 2025, doi: 10.56706/ik.v19i1.114.
[4] Y. Anzari, E. Sany, L. Simorangkir, M. Subhan, A. Rachmawati, and Suroto, “EVALUASI KINERJA KOMPUTASI DAN KRIPTANALISIS BRUTE FORCE PADA ALGORITMA CAESAR CIPHER BERBASIS PYTHON,” Djtechno J. Teknol. Inf., vol. 6, no. 3, pp. 1141–1154, 2025, doi: 10.46576/djtechno.
[5] U. J. Ningsih, S. Salsabila, I. Hutapea, D. Santika, and I. Gunawan, “Pendekripsian Caesar Chiper Dengan Menggunakan Teknik-Teknik Kriptanalisis,” J. Ilmu Komput. dan Multimed., vol. 1, no. 1, pp. 11–15, 2024, doi: 10.46510/ilkomedia.v1i1.10.
[6] R. Alfiansyah, Fitriyani, and N. Ikhsan, “Kriptanalisis Md5 Dengan Menggunakan Pendekatan Komputasi,” e-Proceeding Eng., vol. 2, no. 2, pp. 6802–6806, 2015.
[7] F. A. Pramudya and Suhardi, “Analisis Keamanan Komparatif Caesar Cipher dan DES dalam Konteks Kebutuhan Keamanan Modern,” Cosm. J. Tek., vol. 2, no. 3, pp. 96–105, 2025.
[8] B. Akiwate and V. Desai, “Artificial Neural Networks for Cryptanalysis of,” Int. J. Innov. Eng. Technol., vol. 2, no. 4, pp. 11–17, 2013.
[9] F. Paradise and S. Indarjani, “ALGEBRAIC ATTACK PADA SIMPLIFIED DATA ENCRYPTION STANDARD (S-DES),” in Seminar Nasional Matematika UI, 2017, pp. 726–735.
[10] S. Andonov, J. Dobreva, L. Lumburovska, S. Pavlov, and A. Popovska-mitrovikj, “Application of Machine Learning in DES Cryptanalysis,” ICT-Innovations 2020, pp. 124–134, 2020.
[11] S. Fan and Y. Zhao, “Analysis of des Plaintext Recovery Based on BP Neural Network,” Secur. Commun. Networks, vol. 2019, doi: 10.1155/2019/9580862.
[12] Y. Xiao, Q. Hao, and D. D. Yao, “Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers,” 2019 IEEE Conf. Dependable Secur. Comput. DSC 2019 - Proc., 2019, doi: 10.1109/DSC47296.2019.8937659.
[13] Y. Fatma, M. A. Remli, M. S. Mohamad, and J. Al Amien, “Deep learning-based cryptanalysis in recovering the secret key and plaintext on lightweight cryptography,” Indones. J. Electr. Eng. Comput. Sci., vol. 38, no. 2, pp. 1115–1123, 2025, doi: 10.11591/ijeecs.v38.i2.pp1115-1123.
[14] Y. R. Nasution, H. Santoso, and S. W. Amalia, “Penerapan Algoritma Vernam dalam Mengamankan Dokumen PDF,” JIRE (Jurnal Inform. Rekayasa Elektron., vol. 6, no. 1, pp. 37–46, 2023.
[15] B. Arya Bagaskara, M. Idhom, and H. Endah Wahanani, “Pengujian Website Dinas Sosial Surabaya Menggunakan Metode Penetration Testing Dan Owasp Top 10,” J. Inform. Rekayasa Elektron., vol. 8, no. 1, pp. 40–50, 2025, [Online]. Available: http://e-journal.stmiklombok.ac.id/index.php/jireISSN.2620-6900.
Published
2026-04-07
How to Cite
GAMALIEL, Fritz; ARLIYANTO, P. Yudi Dwi. IMPLEMENTASI KRIPTANALIS BERBASIS NEURAL NETWORK FEEDFORWARD BACKPROPAGATION MULTI LAPIS TERHADAP KRIPTOGRAFI S-DES. Jurnal Manajamen Informatika Jayakarta, [S.l.], v. 6, n. 2, p. 102-111, apr. 2026. ISSN 2797-0930. Available at: <https://journal.stmikjayakarta.ac.id/index.php/JMIJayakarta/article/view/2239>. Date accessed: 10 apr. 2026. doi: https://doi.org/10.52362/jmijayakarta.v6i2.2239.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.